During the last quarter of 2019, the ClearSky research team has uncovered a widespread Iranian offensive campaign called “Fox Kitten…
Browsing: Identity and access management (IAM)
An interesting story has run on exposed databases. According to a story in Infosecurity Magazine, a US education non-profit, the…
5G is here to replace not just legacy cellular standards, but a multitude of other wireless and wired communication standards…
Security researchers have disclosed a dozen flaws in the implementation of the Bluetooth Low Energy technology on multiple system-on-a-chip (SoC)…
Geopolitical tension has a long-tail effect in cyberspace. In the aftermath of major political or military incidents, beneath the public…
Within a few months, Google Nest users will be required to use two-factor authentication (2FA) to access their devices. Google…
Love is purportedly in the air again, but is it being harnessed and channelled in the right direction? This Valentine’s…
A recently uncovered phishing campaign, targeting PayPal users, pulls out all the stops and asks victims for the complete spectrum…
What makes for a successful cyberattack? Technology is one part of the picture, clearly. Malicious cybercriminals make use of a…
Under UK law, it’s an employer’s duty to protect the health, safety and welfare of their employees and other people…